Sciweavers

5864 search results - page 1112 / 1173
» Can We Work around Numerical Methods
Sort
View
ICDE
2010
IEEE
434views Database» more  ICDE 2010»
15 years 10 months ago
Route skyline queries: A multi-preference path planning approach
— In recent years, the research community introduced various methods for processing skyline queries in multidimensional databases. The skyline operator retrieves all objects bein...
Hans-Peter Kriegel, Matthias Renz, Matthias Schube...
146
Voted
PROVSEC
2009
Springer
15 years 9 months ago
Oracle Separation in the Non-uniform Model
Abstract. Oracle separation methods are used in cryptography to rule out blackbox reductions between cryptographic primitives. It is sufficient to find an oracle relative to whic...
Ahto Buldas, Sven Laur, Margus Niitsoo
122
Voted
SEMWEB
2001
Springer
15 years 9 months ago
Conceptual Open Hypermedia = The Semantic Web?
The Semantic Web is still a web, a collection of linked nodes. Navigation of links is currently, and will remain for humans if not machines, a key mechanism for exploring the spac...
Carole A. Goble, Sean Bechhofer, Les Carr, David D...
IPPS
2000
IEEE
15 years 9 months ago
Three Dimensional VLSI-Scale Interconnects
As processor speeds rapidly approach the Giga-Hertz regime, the disparity between process time and memory access time plays an increasing role in the overall limitation of processo...
Dennis W. Prather
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
15 years 8 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
« Prev « First page 1112 / 1173 Last » Next »